|
8 | 8 | * README:
|
9 | 9 |
|
10 | 10 | 1. Consider using Tor Browser if it meets your needs or fits your threat model
|
11 |
| - * https://www.torproject.org/about/torusers.html.en |
| 11 | + * https://2019.www.torproject.org/about/torusers.html |
12 | 12 | 2. Required reading: Overview, Backing Up, Implementing, and Maintenance entries
|
13 | 13 | * https://github.com/arkenfox/user.js/wiki
|
14 | 14 | 3. If you skipped step 2, return to step 2
|
@@ -479,7 +479,7 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
|
479 | 479 | * no unsafe renegotiations on the channel between the browser and the server.
|
480 | 480 | * [STATS] SSL Labs (July 2021) reports over 99% of sites have secure renegotiation [4]
|
481 | 481 | * [1] https://wiki.mozilla.org/Security:Renegotiation
|
482 |
| - * [2] https://tools.ietf.org/html/rfc5746 |
| 482 | + * [2] https://datatracker.ietf.org/doc/html/rfc5746 |
483 | 483 | * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
|
484 | 484 | * [4] https://www.ssllabs.com/ssl-pulse/ ***/
|
485 | 485 | user_pref("security.ssl.require_safe_negotiation", true);
|
@@ -1031,12 +1031,11 @@ user_pref("_user.js.parrot", "4500 syntax error: the parrot's popped 'is clogs")
|
1031 | 1031 | * RFP also has a few side effects: mainly timezone is UTC0, and websites will prefer light theme
|
1032 | 1032 | * [1] https://bugzilla.mozilla.org/418986 ***/
|
1033 | 1033 | user_pref("privacy.resistFingerprinting", true);
|
1034 |
| -/* 4502: set new window sizes to round to hundreds [FF55+] [SETUP-CHROME] |
1035 |
| - * Width will round down to multiples of 200s and height to 100s, to fit your screen. |
1036 |
| - * The max values are a starting point to round from if you want some control |
| 1034 | +/* 4502: set new window size rounding max values [FF55+] |
| 1035 | + * [SETUP-CHROME] sizes round down in hundreds: width to 200s and height to 100s, to fit your screen |
1037 | 1036 | * [1] https://bugzilla.mozilla.org/1330882 ***/
|
1038 |
| - // user_pref("privacy.window.maxInnerWidth", 1000); |
1039 |
| - // user_pref("privacy.window.maxInnerHeight", 1000); |
| 1037 | +user_pref("privacy.window.maxInnerWidth", 1600); |
| 1038 | +user_pref("privacy.window.maxInnerHeight", 900); |
1040 | 1039 | /* 4503: disable mozAddonManager Web API [FF57+]
|
1041 | 1040 | * [NOTE] To allow extensions to work on AMO, you also need 2662
|
1042 | 1041 | * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1384330,1406795,1415644,1453988 ***/
|
@@ -1221,7 +1220,7 @@ user_pref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: true]
|
1221 | 1220 | * string is restored if the tab reverts back to the original page. This change prevents some cross-site attacks
|
1222 | 1221 | * [TEST] https://arkenfox.github.io/TZP/tests/windownamea.html ***/
|
1223 | 1222 | user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true]
|
1224 |
| -/* 6050: prefsCleaner: reset previously active items removed from arkenfox FF91+ ***/ |
| 1223 | +/* 6050: prefsCleaner: reset previously active items removed from arkenfox FF92+ ***/ |
1225 | 1224 | // placeholder
|
1226 | 1225 |
|
1227 | 1226 | /*** [SECTION 7000]: DON'T BOTHER ***/
|
|
0 commit comments